// For flags

CVE-2006-1359

Microsoft Internet Explorer - HTML Tag Memory Corruption (MS06-013)

Severity Score

9.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

6
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Microsoft Internet Explorer 6 and 7 Beta 2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a certain createTextRange call on a checkbox object, which results in a dereference of an invalid table pointer.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2006-03-22 CVE Reserved
  • 2006-03-23 CVE Published
  • 2006-03-23 First Exploit
  • 2024-07-12 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (36)
URL Tag Source
http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1427.html Mailing List
http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1430.html Mailing List
http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1434.html Mailing List
http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1662.html Mailing List
http://secunia.com/secunia_research/2006-7/advisory X_refsource_misc
http://securitytracker.com/id?1015812 Vdb Entry
http://www.ciac.org/ciac/bulletins/q-154.shtml Government Resource
http://www.kb.cert.org/vuls/id/876678 Third Party Advisory
http://www.microsoft.com/technet/security/advisory/917077.mspx X_refsource_confirm
http://www.osvdb.org/24050 Vdb Entry
http://www.securityfocus.com/archive/1/428441 Mailing List
http://www.securityfocus.com/archive/1/428583/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/428600/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/429088/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/429124/30/6120/threaded Mailing List
http://www.us-cert.gov/cas/techalerts/TA06-101A.html Third Party Advisory
http://www.vupen.com/english/advisories/2006/1050 Vdb Entry
http://www.vupen.com/english/advisories/2006/1318 Vdb Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/25379 Vdb Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1178 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1657 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1678 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1702 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A985 Signature
http://web.archive.org/web/20060418044756/http://secunia.com:80/secunia_research/2006-7/advisory
https://seclists.org/lists/bugtraq/2006/Mar/0410.html
https://seclists.org/lists/fulldisclosure/2006/Mar/1439.html
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Microsoft
Search vendor "Microsoft"
Ie
Search vendor "Microsoft" for product "Ie"
6.0
Search vendor "Microsoft" for product "Ie" and version "6.0"
sp1
Affected
Microsoft
Search vendor "Microsoft"
Ie
Search vendor "Microsoft" for product "Ie"
6.0
Search vendor "Microsoft" for product "Ie" and version "6.0"
sp2
Affected
Microsoft
Search vendor "Microsoft"
Ie
Search vendor "Microsoft" for product "Ie"
7.0
Search vendor "Microsoft" for product "Ie" and version "7.0"
beta_2
Affected
Microsoft
Search vendor "Microsoft"
Internet Explorer
Search vendor "Microsoft" for product "Internet Explorer"
6.0
Search vendor "Microsoft" for product "Internet Explorer" and version "6.0"
-
Affected